DeepMind

Risk assessment 29%

50%
Evals: domains, quality, elicitation
1%
Evals: accountability
0%
Adversarial evaluation for alignment
10%
Model organisms

Evals: domains, quality, elicitation

50%
Click to show details/rubric

Evals: accountability

1%
Click to show details/rubric

Adversarial evaluation for alignment

0%
Click to show details/rubric

Model organisms

10%
Click to show details/rubric

Scheming risk prevention 8%

20%
Safety case: process
0%
Safety case: accountability
5%
Internal deployment protocol
0%
External deployment protocol
0%
Plan for if an AI is caught scheming
0%
Training: remove scheming capabilities
0%
Training: adversarial training
55%
Training: safe architecture

Safety case: process

20%
Click to show details/rubric

Safety case: accountability

0%
Click to show details/rubric

Internal deployment protocol

5%
Click to show details/rubric

External deployment protocol

0%
Click to show details/rubric

Plan for if an AI is caught scheming

0%
Click to show details/rubric

Training: remove scheming capabilities

0%
Click to show details/rubric

Training: adversarial training

0%
Click to show details/rubric

Training: safe architecture

55%
Click to show details/rubric

Boosting safety research 55%

67%
Publishing safety research
0%
Deep access for external safety researchers
100%
Mentoring external safety researchers

Publishing safety research

67%
Click to show details/rubric

Deep access for external safety researchers

0%
Click to show details/rubric

Mentoring external safety researchers

100%

Misuse prevention 4%

10%
Safety case: process
0%
Safety case: accountability
0%
Removing dangerous capabilities
0%
Emergency protocol

Safety case: process

10%
Click to show details/rubric

Safety case: accountability

0%
Click to show details/rubric

Removing dangerous capabilities

0%
Click to show details/rubric

Emergency protocol

0%
Click to show details/rubric

Prep for extreme security 5%

0%
Plan for SL5
0%
Red-team resilience
0%
Practices: isolated network
50%
Practices: secure developers' machines
25%
Practices: multiparty controls
25%
Practices: secure boot
0%
Track record

Plan for SL5

0%
Click to show details/rubric

Red-team resilience

0%

Practices: isolated network

0%
Click to show details/rubric

Practices: secure developers' machines

50%
Click to show details/rubric

Practices: multiparty controls

25%
Click to show details/rubric

Practices: secure boot

25%
Click to show details/rubric

Track record

0%

Information sharing 13%

0%
Incident reporting
30%
Talk about extreme risks
0%
Describe worst-case outcome
25%
Don't publish some capabilities research

Incident reporting

0%
Click to show details/rubric

Talk about extreme risks

30%
Click to show details/rubric

Describe worst-case outcome

0%
Click to show details/rubric

Don't publish some capabilities research

25%
Click to show details/rubric

Planning 26%

50%
Safety plan
0%
Plan for how to use AGI
5%
Prepare for a pivot

Safety plan

50%
Click to show details/rubric

Plan for how to use AGI

0%
Click to show details/rubric

Prepare for a pivot

5%
Click to show details/rubric